Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityLogical SecurityHospitals & Medical Centers

Healthcare Cybersecurity Is in Crisis — These Proven Controls Could Be the Cure

By Jud Dressler
Medical professional using tablet
Nappy via Unsplash
February 5, 2026

The United States healthcare sector faces an unprecedented cybersecurity crisis, experiencing twice as many breaches in 2025 as it did in 2024. According to a new analysis of insurance claims data from Resilience, the average incurred losses in the sector last year topped $2M. With lives at stake, the cost of disruption is staggering — in turn making healthcare organizations a primary target for threat actors looking for bigger payouts. 

Adding fuel to the fire, healthcare organizations are also facing increasing regulatory pressure amidst finite budgets and even more limited staffing resources. This perfect storm means that in 2026, healthcare cybersecurity leaders must prioritize the investments that meaningfully reduce material risk while fitting into their operational budget. 

Amidst all the noise, how can leaders learn what those investments are? The Risk Operations Center at Resilience recently conducted an analysis of incidents, claims, and loss data across healthcare organizations in its portfolio to identify new, data-driven benchmarks for healthcare security leaders seeking the levers with the highest ROI to protect their patients’ data — and well-being. 

Here are those top five levers. 

Companywide Anti-Fraud Training

Social engineering remains a dominant driver of material losses across observed healthcare cyber loss events, fueling 88% of material losses in the portfolio in the first half of 2025. In healthcare specifically, a security-focused culture, including continuous, internal training against fraud and phishing scams, is what delivered a high reduction in value at risk. The analysis found that within healthcare organizations, phishing training programs reduced risk by $110K. 

In 2026, organizations should establish continuous anti-fraud training programs that build a security-focused culture. Personnel must be trained to slow down and adopt a mindset of healthy skepticism, critically assessing any communication or request that triggers a sense of unease or suggests potential malicious pressure. Prioritizing robust training and education is one of the most effective ways organizations can reduce human error and improve security posture. 

Breach and Attack Simulation on EDR Platforms

A good cyber posture isn’t about being invulnerable to an attack, but knowing how to ensure business continuity and protect patients in the case of a breach. But organizations can’t protect against what they can’t see. They need to know where the gaps in their system are and be ready for a breach in those areas. 

Specifically, endpoint detection and response (EDR) tools are now common across healthcare environments, but many deployments contain blind spots due to misconfiguration, incomplete coverage, or outdated detection logic. Organizations that routinely conduct breach and attack simulations (BAS) or penetration tests to validate EDR and endpoint controls were better positioned to identify and remediate detection gaps before an incident.

It’s no longer acceptable to assume EDR coverage is effective. Healthcare organizations have to continuously validate it to ensure these capabilities will perform as expected during a real-world incident. 

Role-Based Access Controls 

Role-based access controls (RBAC), on average, reduced extreme loss by $2.4M, making it one of the highest loss-prevention controls in the portfolio. Privileged access protections help secure highly sensitive patient information and reduce regulatory, legal, and notification exposure following an incident. For healthcare organizations with sprawling systems, diverse user types, and sensitive data being stored, formalizing access controls reduces unnecessary access paths and limits lateral movement during an intrusion.

RBAC that formalizes access permissions across these sprawling systems should be prioritized. They dramatically reduce the risk of exposure and limit the potential scope of a breach. Without these controls, once an attacker gains access to credentials in an organization’s system, they can move anywhere they want, wreaking havoc. Organizations don’t need complex systems to keep attackers out; they need simple controls to minimize damage. 

Dual Authorization for Wire Transfers

Using AI, threat actors are improving the pace and sophistication of social engineering attacks targeting finance teams. According to a recent World Economic Forum survey, 87% of cybersecurity teams believe AI-driven risk has increased in the last year. The use of AI-enabled impersonation has made it even more difficult to identify a wolf in sheep’s clothing in your network. Once a wire transfer goes to a bad actor, the chances of recovering that large sum are slim. 

One of the best ways to avoid this type of fraud in wire transfers of large payments is to implement dual authorization. Requiring two people to sign off on wire transfers adds a crucial layer of redundancy that can easily disrupt fraud. The two sets of eyes approach is incredibly useful for spotting inconsistencies, recent or unexpected changes, or other anomalies that a single reviewer might miss. This requires minimal technical investment relative to the losses it helps prevent; what may seem like a straightforward control has proven to be one of the best protections against financially motivated fraud. 

MFA for Email Access

While the human element remains a primary risk focus and training is an essential first step, humans are fallible. It’s crucial to create a barrier against phishing and business email compromise attacks, which are common entry points for threat actors. Given the high-value, sensitive nature of Protected Health Information (PHI) that healthcare organizations are responsible for, securing email platforms is an important step for reducing cyber risk. Multi-factor authentication (MFA) for email remains one of the highest-ROI controls for reducing phishing and credential-based losses. This foundational security layer continues to outperform many more complex or costly tools in terms of reducing initial access through email compromise. 

For optimal security, prioritize authenticator applications and physical security keys as they offer stronger protection against phishing and man-in-the-middle attacks than less secure methods such as SMS or voice calls. 

For healthcare organizations entering 2026 without MFA on email, closing that gap should be treated as foundational risk reduction, rather than a discretionary security enhancement.

The Big Picture

Healthcare organizations stand at a critical juncture. Social engineering is more sophisticated, and threat actors are looking for bigger payouts, making healthcare a primary target for attacks. But this insight, based on real insurance data rather than platitudes or fearmongering, reveals a brighter picture for healthcare organizations willing to take action. 

By focusing on the five proven controls listed above, healthcare organizations can achieve significant reductions in cyber risk. The path to battery security is clearer than ever — now it’s up to healthcare organizations to install the practices that actually move the needle in reducing cyber risk. 

KEYWORDS: best practices data protection healthcare cybersecurity organizational resilience

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jud dressler headshot

Jud Dressler is the Director of the Resilience Risk Operations Center. Image courtesy of Dressler 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Tree shaped as dollar sign

The Salary of a Chief Security Officer

Classroom with rows of desks facing a chalkboard

The AI Powered Classroom Network of the Future: Because Hackers Never Take Recess

Jaguar logo

New Update on Jaguar Land Rover Cyberattack: Q3 Wholesales Down 43%

Cloud icon

Google Cloud Service Exploited in New Phishing Campaign

Person holding phone to smart lock

Why it’s Time to Move on From Legacy Access Control Systems

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Corporate liability for the opioid crisis?

    Trial in West Virginia could establish corporate liability for the opioid crisis

    See More
  • cyber freepik

    K-12 cybersecurity education is the key to solving our national cybersecurity crisis

    See More
  • doctor telehealth freepik

    Will 2020 be the cybersecurity wakeup call healthcare needed?

    See More

Related Products

See More Products
  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • The Database Hacker's Handboo

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing